- Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M. and Reagle, J. “The Platform for Privacy Preferences 1.0 (P3P1.0) Specification.” W3C Recommendation. 16 April 2002.
- Cranor, L. and Wenning, R. Why P3P is a Good Privacy Tool for Consumers and Companies. GigaLaw.com. April 2002.
- Computer Information Technology Corporation. PrivaCert™ and Identifiability Risk Analysis Assessment. Pittsburgh: 2002.
- Decker, K., Sycara, K. and Williamson, M. "Middle-Agents for the Internet", Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence (IJCAI-97), Nagoya, Japan, August 1997 pp. 578-584.
- Gandon, F. and Sadeh, N., “Semantic Web Technologies to Reconcile Privacy and Context Awareness”, Journal of Web Semantics, Vol. 1, No. 3, forthcoming.
- Gandon, F. and Sadeh, N., “A Semantic eWallet to Reconcile Privacy and Context Awareness”, to appear in Proceedings of the Second International Semantic Web Conference (ISWC03), Florida, October 2003.
- Malin, B., Sweeney, L., and Newton, E. Trail Re-identification: Learning Who You are From Where You Have Been. Carnegie Mellon University, School of Computer Science, Data Privacy Laboratory Technical Report, LIDAP-WP12. Pittsburgh: February 2003. Available at http://dataprivacylab.org/people/sweeney/trails1.html.
- Newton, E., Sweeney, L. and Malin, B. Preserving Privacy by De-identifying Facial Images. Carnegie Mellon University, School of Computer Science, Technical Report, CMU-CS-03-119. Pittsburgh: 2003. Available at
- Sadeh, N., Chan, T., Van, L. Kwon, O. and Takizawa, K.. “Creating an Open Agent Environment vfor Context-aware M-Commerce”, in “Agentcities: Challenges in Open Agent Environments”, Ed. by Burg, Dale, Finin, Nakashima, Padgham, Sierra, and Willmott, LNAI, Springer Verlag, pp.152-158, 2003
- Sadeh, N., "mCommerce: Technologies, Services and Business Models", Wiley, April 2002.
- Sweeney, L. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 571-588. Available at http://dataprivacylab.org/people/sweeney/kanonymity2.html.
- Sweeney, L. Finding Lists of People on the Web. Carnegie Mellon University, School of Computer Science, Technical Report. Pittsburgh: 2003. Available at
- Sweeney, L. Information Explosion. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, L. Zayatz, P. Doyle, J. Theeuwes and J. Lane (eds), Urban Institute, Washington, DC, 2001.
- Sweeney, L. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 557-570. Available at http://dataprivacylab.org/people/sweeney/kanonymity.html.
- Sweeney, L. ed. Navigating Computer Science Research Through Waves of Privacy Concerns: Discussions among Computer Scientists at Carnegie Mellon University, Carnegie Mellon University, School of Computer Science, Tech Report, CMU CS 03-165, CMU-ISRI-03-102. Pittsburgh: July 2003. Available at
- Sweeney, L. “Replacing Personally-Identifying Information in Medical Records, the Scrub System.” In: Cimino, JJ, ed. Proceedings, Journal of the American Medical Informatics Association. Washington, DC: Hanley & Belfus, Inc., 1996.
- Sweeney, L. Three computational systems for disclosing medical data in the year 1999. Proceedings, MEDINFO 98. International Medical Informatics Association. Seoul, Korea. North-Holland, 1998.
- Sweeney, L. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics. 1997, 25:98-110.
- Wong, H.C., Sycara, K., "Adding Security and Trust to Multi-Agent Systems" Applied Artificial Intelligence, vol 14, No. 9, pp. 927-941, October 2000.
- Sweeney, L. et al. Technologies for Privacy July 2003.
- Slideshow presentation available in PDF.
- Short summary (3-pages) available in PDF.